September 19, 2021 at 11:29:57 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Runtime: 1m
On September 19, 2021 at 11:29:57 AM UTC, https://theintercept.com/ presented signs of DNS tampering on AS4134 in China.
This might mean that https://theintercept.com/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
203.75.51.2
Query:
IN A theintercept.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
128.242.240.59
AS2914 (NTT America, Inc.)
Query:
IN AAAA theintercept.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001::430f:81d2
AS6939 (Hurricane Electric LLC)
TCP Connections
2001::430f:81d2:443: failed (generic_timeout_error)
128.242.240.59:443: failed (generic_timeout_error)
HTTP Requests
No data
Resolver
Resolver ASN
AS3462
Resolver IP
203.75.51.2
Resolver Network Name
Chunghwa Telecom Co., Ltd.
Measurement UID
20210919113058.269503_CN_webconnectivity_20264e8166c71119
Report ID
20210919T100606Z_webconnectivity_CN_4134_n1_JXjff7dBG6IkodwJ
Platform
linux
Software Name
ooniprobe-cli (3.11.0-alpha)
Measurement Engine
ooniprobe-engine (3.11.0-alpha)